[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Announcing SecureDrive Version 1.3
- To: Cypherpunks <[email protected]>
- Subject: Announcing SecureDrive Version 1.3
- From: [email protected] (Edgar W. Swank)
- Date: Sat, 11 Feb 89 13:15:56 PST
- Comments: Liberty!
- Organization: SPECTROX SYSTEMS (408)252-1005 Cupertino, Ca, USA
-----BEGIN PGP SIGNED MESSAGE-----
This is to announce the availability of Version 1.3 of SecureDrive.
This release of Secure Drive is based on releases 1.0 and 1.1, mostly
written by
Mike Ingle <[email protected]>
and version 1.2, with significant new code by myself.
The code which we wrote is not copyrighted, but the program contains GNU
Copylefted code, and therefore may be freely distributed under the terms of
the GNU General Public Licence. See file COPYING for legalese.
Version 1.2 and 1.3 add significant new function.
As of Version 1.2, you may use an operand /PGP with LOGIN, either
by itself, or with other operands. By itself,
LOGIN /PGP
will prompt for a passphrase and set the PGPPASS environment variable with
whatever is entered. If PGPPASS is already set then
LOGIN D: /PGP
or
LOGIN /F /PGP
will use whatever PGPPASS is set to as the passphrase. For the hard
disk partition, LOGIN will test the PGPPASS passphrase. If it is incorrect,
then it will prompt you for another passphrase.
If PGPPASS is NOT set when these forms of LOGIN are used, than a passphrase
is prompted for AND PGPPASS is set to this passphrase. This is more
secure than using the SET command since LOGIN only echoes "*"'s when
entering the passphrase.
As of Version 1.2, typing LOGIN /C /PGP will clear the SecureDrive crypto
keys from memory AND clear the PGPPASS environment variable. This is done
in a manner less likely to leave your passphrase in memory than just using
the DOS SET command. In addition, Version 1.2 clears all the free memory
it can find, which is likely to include some plaintext. However, if you
want to be absolutely sure all traces of sensitive data are erased from
memory then turning off the computer is still recommended.
As of version 1.2, if PGPPASS is set before you run CRYPTDSK, CRYPTDSK
will ask to use the value of PGPPASS for the passphrase before
prompting you (for encryption), or try PGPPASS (for decryption).
Obviously, if you encrypt or decrypt a lot of diskettes at once, this
feature can save you a lot of typing.
The purpose of these changes is to allow you to enter a single passphrase
only once per boot IF you choose to use the same passphrase for your PGP
secret key, your SecureDrive encrypted hard disk partition, and SecureDrive
encrypted floppies.
Version 1.3 supports up to four hard drive partitions in "safe" mode,
only one of which may be active at any given time. One purpose of
having multiple encrypted hard disk partitions is so that up to four
users (perhaps members of a family) can each have their own encrypted
partition with its own unique passphrase. This allows up to four
users to have privacy from each other, even if they all use the same
PC and physical hard disk(s).
Version 1.3 gives you a choice of whether to use the version 1.1
passphrase digest or to use the (faster but perhaps slightly less
secure) 1.0 version. If you select 1.0 compatiblity, it's unnecessary
to decrypt and re-encrypt your 1.0-encrypted hard disk partition(s)
and floppies.
If you decide to switch to 1.1 passphrases, Version 1.3 CRYPTDSK will
allow you to convert in one pass with no plaintext stored on disk.
Version 1.3 includes the 1.2 changes for using PGPPASS. There are
additional ehhancements to allow you to use the hard disk passphrase
for the floppy disks without typing it in, even if PGPPASS is not set
or is something different.
Version 1.3 CRYPTDSK will operate on hard drives with SECTSR loaded.
It uses SECTSR to protect the disk during conversion and will leave an
encrypted disk partition in protected mode.
Mike Ingle and I have different opinions on the distribution of
SecureDrive. Under the GNU General License (copyleft) I do not need
Mike's permission to distribute version 1.3 and I have not asked for
same. My policy on distribution is in the version 1.3 doc:
Exporting this program. Cryptography is export controlled, and
sending this program outside the country may be illegal. Don't do
it.
The "author" of versions 1.2 and 1.3, Edgar Swank, says that the
export ban should not prevent you from placing this program on
public BBS's and anonymous FTP sites in the US and Canada. If
individuals outside the US/Canada use the internet or
international long distance to obtain copies of the program, THEY
may be breaking US law.
Any such foreign individuals should be aware that US law
enforcement may legally (under US law) apprehend individuals who
break US laws even if such individuals are not on or even have
never been on US soil. Such apprehension may remove such
individuals directly to US jurisdiction without benefit of
extradition proceedings in such individuals' home country(ies).
This has actually happened in at least two cases, Mexico --
suspect in murder of US drug agent, Panama -- Noriega -- indicted
in absencia for drug smuggling. As is well known, after a small
war with Panama, Noriega was brought to the USA, tried and
convicted. He is now a guest of the US Government in a Florida
prison.
SecureDrive Version 1.3 is already available for download on the
following public BBS's as SECDRV13.ZIP:
Eagle's Nest (408)223-9821
Flying Dutchman (408)294-3065
I am sending today (1/27) copies of Version 1.3 to many of you
who requested Version 1.2. I will send copies to the rest of you
in the next few days.
I will send a FEW more copies via E-mail to persons with a US/Canada
net address who request a copy AND promise to upload it to an e-mail
fileserver or anonymous FTP site. (I don't have access to FTP from my
account here).
Others, please be patient. I will announce here as I learn of Version
1.3 availability via automated e-mail or FTP.
Here is the contents of SECDRV13.ZIP:
Length Method Size Ratio Date Time CRC-32 Attr Name
------ ------ ----- ----- ---- ---- -------- ---- ----
19664 DeflatX 4183 79% 11-19-93 21:42 22c2502c --w- CRYPT2.ASM
152 Stored 152 0% 01-26-94 13:50 103e49b0 --w- SECTSR.SIG
15392 DeflatX 3806 76% 01-24-94 02:10 0f76d44f --w- CRYPTDSK.C
152 Stored 152 0% 01-26-94 13:50 e5971bcc --w- LOGIN.SIG
152 Stored 152 0% 01-26-94 13:51 c11247ab --w- CRYPTDSK.SIG
18321 DeflatX 6914 63% 06-14-93 22:27 0767480b --w- COPYING
1632 DeflatX 1260 23% 12-04-93 00:43 980125ec --w- KEY.ASC
10915 DeflatX 3003 73% 01-22-94 18:40 c3446c57 --w- LOGIN.C
1355 DeflatX 629 54% 01-21-94 08:44 db63ade4 --w- RLDBIOS.ASM
33 Stored 33 0% 07-16-93 06:09 aa6151a5 --w- M.BAT
1332 DeflatX 518 62% 01-26-94 13:42 bbb5655c --w- MAKEFILE
11557 DeflatX 3277 72% 05-09-93 19:38 e71f3eea --w- MD5.C
3407 DeflatX 1097 68% 05-11-93 12:49 f1f58517 --w- MD5.H
10343 DeflatX 2707 74% 01-23-94 02:29 0b935e6f --w- SDCOMMON.C
30641 DeflatX 10321 67% 01-24-94 04:01 c4e930cc --w- SECDRV.DOC
3020 DeflatX 909 70% 01-24-94 03:32 8ee1c1f6 --w- SECDRV.H
24587 DeflatX 7700 69% 01-24-94 03:32 5ee1ce10 --w- SECTSR.ASM
1778 DeflatX 1151 36% 01-26-94 13:44 1182f861 --w- SECTSR.COM
7507 DeflatX 2581 66% 12-29-93 21:15 ceda9b20 --w- SETENV.ASM
1254 DeflatX 541 57% 05-09-93 19:39 182978aa --w- USUALS.H
33280 DeflatX 15718 53% 01-26-94 13:44 cdb55069 --w- LOGIN.EXE
34424 DeflatX 16398 53% 01-26-94 13:44 dc1ca9a9 --w- CRYPTDSK.EXE
------ ------ --- -------
230898 83202 64% 22
Also note that the ZIP file contains PGP detached signatures (*.SIG)
for the executable files. Finally here is my public key, also
available on many public keyservers; note who has signed it.
Type bits/keyID Date User ID
pub 1024/87C0C7 1992/10/17 Edgar W. Swank <[email protected]>
- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.3a
mQCNAirfypkAAAEEAKe2jziPeFw6hY19clR2GtQ4gtGCSSVOTgPKEJzHfuC74Scf
9PEuu1kebLhHk43A9wo1vr52o4jpH/P/tnFmRtBQOMzLUzAt5rMucswtSVviMQS2
hBuc9yGJKWHVcyfA79EARKEYTdhx+2qKI+hFJcPE+rmD8wVoF94nNf3ah8DHAAUR
tClFZGdhciBXLiBTd2FuayA8ZWRnYXJAc3BlY3RyeC5zYWlnb24uY29tPokAlQIF
ECwAALo04ip/MkW/XQEBmNQD/0jUVqT0LMoVvw7Zz2FXyWrdBn6bRlyGxeqQWhig
DXRipZ824/fHbA2vkbAczEayw8ZpwRVmhWNsxxWhjYFIi92KYJbAP/XIbr+rEuTI
hPKKKKhuuGLUWhfXhCFluHjs3CA6ZQwnT4jnu1NlCkcnWLbL4ktqub2zLwrHCPUe
31L1iQCUAgUQK9Y50xgzoWUItwfFAQHPrAPzBbf6lQyzwbUwdxayzLDoh3Hygnun
Looi+yzziEVQchOgSt3sLe2I108DLxTgp+26lJYTAZB+Gg8HGyB+Nz6263D0XlVU
XQi9/7CSRyd8bhYFeuFPwFzHPWZlyLDAIsuaEfBsmp2DBLgffvhUCqiiWYmP9oa+
rOA+5IHS+xN8tIkAVQIFECu5dYOzvL/Jh3qmYQEBYDICAI5KdaTiPr2Y1OtRCTi6
xMG6hnRNalvK9C5d/bxrKnUYqsfSpKayX+Ts9psmq6a6doOrX3AAtgcZuTCYUfQk
d22JAJUCBRArlzITocE4X0qvAOUBAahdA/4rRoSVp3G+Ki0wvkcAvpnwt7vSEYpH
XSkyoC8LdAqs9bft5NDTOykgw5H1qFG1Doqk6oR0yxY0k91eVoBVclLWDb94sNO3
JjHJKO/QdODik5DpmXEnQhBfLlujuYkCtJjoBv1+QdImnnv9aNidGuLAneNvZ+UN
NqfE3IRShzNw3IkAlQIFECtj5iw2VpfGMt2Y2QEBDEYD/2iMMml65eFaNWrNP7ab
Yh8QW3+Mnjyl5CNpAjGkxejmIm4nZKqUHN5DuGzpJDnstRwbz6daXK15XcoM1m8g
uhu6UzIwHs9+hbKE6inTCz4C0mE55PSmvF/ejjexnGzsiFpuFnjN/sRrSHc57flO
IUWBCZD8Hizz3aYBxmvwJ863iQCVAgUQKxEXHOJ13g7/Z/cLAQGyYgP/apcv9V2M
bHFgU0hl0D4MLqGjBReUfDroxQCsgsTb/0nr1W9yltBMqYPgD7ThLAf2rxIPNbGy
D7VUA27LTwQTS6n2mbtkHOvGQVw7J2GwTA6319Gf0Qne0M1h7VJWjFX0Vzjuh/nk
6btxM2uTLSF2nUsDXe5/9N5XeesFhrbXNrM=
=4fGE
- -----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: 2.3a
iQCVAgUBLUgdGN4nNf3ah8DHAQE3rwP/cUjbBeR/VQ5dLeyC8TNgfIuqGCVoqBgp
eBu+F5TGjOLU4iCx4vcZZr+iEiK9CZ0fruZ5eMEcOqZAyWGK6dKZajVcJR2dzXv3
FpCtsXPXtL4e8OIpyo+UyH/xYJoHDIOGWrD/5WOIp1ASOX+2alAPRnDcFh5p8EFv
sFSpsZSZLjM=
=xk12
-----END PGP SIGNATURE-----
--
[email protected] (Edgar W. Swank)
SPECTROX SYSTEMS +1.408.252.1005 Cupertino, Ca